1263 | -- | 1278 | Yu-Chu Tian, David Levy. Compensation for control packet dropout in networked control systems |
1279 | -- | 1292 | Alexandru Mihai Bica. Error estimation in the approximation of the solution of nonlinear fuzzy Fredholm integral equations |
1293 | -- | 1308 | Ali Abbasi Molai, Esmaile Khorram. An algorithm for solving fuzzy relation equations with max-T composition operator |
1309 | -- | 1324 | Tofigh Allahviranloo, E. Ahmady, N. Ahmady. Nth-order fuzzy linear differential equations |
1325 | -- | 1333 | Yau-Tarng Juang, Yun-Tien Chang, Chih-Peng Huang. Design of fuzzy PID controllers using modified triangular membership functions |
1334 | -- | 1342 | Wenyi Zeng, Ping Guo. Normalized distance, similarity measure, inclusion measure and entropy of interval-valued fuzzy sets and their relationship |
1343 | -- | 1354 | Osman Kazanci, Bijan Davvaz. On the structure of rough prime (primary) ideals and rough fuzzy prime (primary) ideals in commutative rings |
1355 | -- | 1371 | Wei-Zhi Wu. Attribute reduction based on evidence theory in incomplete decision systems |
1372 | -- | 1390 | Ki K. Lee, Wan C. Yoon. A classifier learning system using a coevolution method for deflection yoke misconvergence pattern classification problem |
1391 | -- | 1406 | Yong Wang, Xiaofeng Liao, Di Xiao, Kwok-Wo Wong. One-way hash function construction based on 2D coupled map lattices |
1407 | -- | 1417 | Hsi-Chung Lin, Sung-Ming Yen, Yi-Hsiung Huang. Security reconsideration of the Huang-Wang nominative signature |
1418 | -- | 1421 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci. An attack on a payment scheme |